Illuminating the Unseen: A Framework for Designing and Mitigating Context-induced Harms in Behavioral Sensing

Read original: arXiv:2404.14665 - Published 5/7/2024 by Han Zhang, Vedant Das Swain, Leijie Wang, Nan Gao, Yilun Sheng, Xuhai Xu, Flora D. Salim, Koustuv Saha, Anind K. Dey, Jennifer Mankoff
Total Score

0

📉

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • The paper highlights the potential harms of behavioral sensing technologies, which are used to track and model human behavior.
  • It proposes a framework to identify and mitigate these harms, which are categorized as identity-based and situation-based.
  • The framework is validated through two real-world case studies, providing empirical evidence of potential harms and demonstrating the framework's effectiveness.
  • The goal is to guide technology builders in designing more context-sensitive sensing technologies to support responsible decision-making in this rapidly evolving field.

Plain English Explanation

Advances in technology have enabled the capture of extensive data on human behavior over time, allowing for the development of behavioral sensing technologies that can model and understand human behavior. However, these technologies are often designed using a top-down approach, based on assumptions made by the technology builders about users' goals, needs, and preferences. This can lead to a lack of context sensitivity, resulting in technologies that do not fully support the diverse needs of users and may even introduce potential harms.

The paper identifies two main types of potential harms: identity-based harms and situation-based harms. Identity-based harms occur when the technology fails to account for the unique identities and experiences of users, leading to misrepresentation or exclusion. Situation-based harms arise when the technology does not consider the specific contexts and circumstances in which users interact with it, leading to inappropriate or harmful outcomes.

To address these issues, the paper proposes a framework that takes a theory-driven approach to identifying and mitigating these potential harms. This framework is then applied to two real-world case studies of behavioral sensing technologies, providing empirical evidence of the identified harms and demonstrating the effectiveness of the framework in addressing them.

The insights gained from this research contribute both conceptually and practically to the field of behavioral sensing technologies. By guiding technology builders in designing more context-sensitive sensing technologies, the aim is to support responsible decision-making and minimize potential harms as the field continues to evolve rapidly.

Technical Explanation

The paper presents a framework for identifying and mitigating potential harms in behavioral sensing technologies, which are used to track and model human behavior over time. The authors note that the widespread use of top-down design approaches, often based on assumptions made by technology builders about user goals, needs, and preferences, can result in a lack of context sensitivity in these technologies.

To address this issue, the authors propose a theory-driven framework for categorizing and addressing potential harms. They identify two primary types of harms: identity-based harms, which occur when the technology fails to account for the unique identities and experiences of users, and situation-based harms, which arise when the technology does not consider the specific contexts and circumstances in which users interact with it.

To validate the framework, the authors applied it to two real-world case studies of behavioral sensing technologies. In the first case study, they examined the use of anomaly behavior analysis frameworks in autonomous vehicles, where potential harms related to privacy and fairness were identified. In the second case study, they analyzed the use of context-based multi-sensor fusion in neurotechnology applications, where potential harms related to security and cognition were uncovered.

The authors' analysis provided empirical evidence of the potential harms and demonstrated the effectiveness of the framework in identifying and addressing these issues. The insights derived from the evaluations, coupled with the reflection on the framework, contribute both conceptually and practically to the field of behavioral sensing technologies.

Critical Analysis

The paper presents a well-structured and comprehensive framework for identifying and mitigating potential harms in behavioral sensing technologies. The classification of harms into identity-based and situation-based categories is a useful conceptual tool that can help technology builders consider a broader range of potential impacts.

The case studies provide valuable insights and demonstrate the practical application of the framework. However, the paper does not delve deeply into the specific implementation details or limitations of the case studies, which could have provided additional context and nuance.

One potential area for further research could be exploring how to effectively engage end-users, particularly those from diverse backgrounds, in the design and development of behavioral sensing technologies. This could help ensure that the technologies are more responsive to the needs and experiences of the intended users, mitigating potential harms.

Additionally, the paper does not address the broader societal implications of the widespread adoption of behavioral sensing technologies, such as the potential for surveillance or the exacerbation of existing power imbalances. Considering these wider implications could strengthen the overall framework and provide a more holistic approach to responsible technology development.

Conclusion

The paper presents a valuable framework for identifying and mitigating potential harms in behavioral sensing technologies, a rapidly evolving field with significant implications for individual and societal wellbeing. By highlighting the importance of context sensitivity and a theory-driven approach, the authors provide a foundation for technology builders to design more responsible and inclusive sensing technologies.

The empirical evidence and insights gained from the case studies contribute to the conceptual and practical advancement of the field, guiding future research and development efforts. As the use of behavioral sensing technologies continues to expand, the adoption of frameworks like the one proposed in this paper will be crucial in ensuring that these technologies support the diverse needs of users and avoid potential harms.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

📉

Total Score

0

Illuminating the Unseen: A Framework for Designing and Mitigating Context-induced Harms in Behavioral Sensing

Han Zhang, Vedant Das Swain, Leijie Wang, Nan Gao, Yilun Sheng, Xuhai Xu, Flora D. Salim, Koustuv Saha, Anind K. Dey, Jennifer Mankoff

Behavioral sensing technologies are rapidly evolving across a range of well-being applications. Despite its potential, concerns about the responsible use of such technology are escalating. In response, recent research within the sensing technology has started to address these issues. While promising, they primarily focus on broad demographic categories and overlook more nuanced, context-specific identities. These approaches lack grounding within domain-specific harms that arise from deploying sensing technology in diverse social, environmental, and technological settings. Additionally, existing frameworks for evaluating harms are designed for a generic ML life cycle, and fail to adapt to the dynamic and longitudinal considerations for behavioral sensing technology. To address these gaps, we introduce a framework specifically designed for evaluating behavioral sensing technologies. This framework emphasizes a comprehensive understanding of context, particularly the situated identities of users and the deployment settings of the sensing technology. It also highlights the necessity for iterative harm mitigation and continuous maintenance to adapt to the evolving nature of technology and its use. We demonstrate the feasibility and generalizability of our framework through post-hoc evaluations on two real-world behavioral sensing studies conducted in different international contexts, involving varied population demographics and machine learning tasks. Our evaluations provide empirical evidence of both situated identity-based harm and more domain-specific harms, and discuss the trade-offs introduced by implementing bias mitigation techniques.

Read more

5/7/2024

💬

Total Score

0

Leveraging Large Language Models for Generating Mobile Sensing Strategies in Human Behavior Modeling

Nan Gao, Zhuolei Yu, Yue Xu, Chun Yu, Yuntao Wang, Flora D. Salim, Yuanchun Shi

Mobile sensing plays a crucial role in generating digital traces to understand human daily lives. However, studying behaviours like mood or sleep quality in smartphone users requires carefully designed mobile sensing strategies such as sensor selection and feature construction. This process is time-consuming, burdensome, and requires expertise in multiple domains. Furthermore, the resulting sensing framework lacks generalizability, making it difficult to apply to different scenarios. In the research, we propose an automated mobile sensing strategy for human behaviour understanding. First, we establish a knowledge base and consolidate rules for data collection and effective feature construction. Then, we introduce the multi-granular human behaviour representation and design procedures for leveraging large language models to generate strategies. Our approach is validated through blind comparative studies and usability evaluation. Ultimately, our approach holds the potential to revolutionise the field of mobile sensing and its applications.

Read more

8/23/2024

Enabling On-Device LLMs Personalization with Smartphone Sensing
Total Score

0

Enabling On-Device LLMs Personalization with Smartphone Sensing

Shiquan Zhang, Ying Ma, Le Fang, Hong Jia, Simon D'Alfonso, Vassilis Kostakos

This demo presents a novel end-to-end framework that combines on-device large language models (LLMs) with smartphone sensing technologies to achieve context-aware and personalized services. The framework addresses critical limitations of current personalization solutions via cloud LLMs, such as privacy concerns, latency and cost, and limited personal information. To achieve this, we innovatively proposed deploying LLMs on smartphones with multimodal sensor data through context-aware sensing and customized prompt engineering, ensuring privacy and enhancing personalization performance. A case study involving a university student demonstrated the capability of the framework to provide tailored recommendations. In addition, we show that the framework achieves the best trade-off in privacy, performance, latency, cost, battery and energy consumption between on-device and cloud LLMs. To the best of our knowledge, this is the first framework to provide on-device LLMs personalization with smartphone sensing. Future work will incorporate more diverse sensor data and involve extensive user studies to enhance personalization. Our proposed framework has the potential to substantially improve user experiences across domains including healthcare, productivity, and entertainment.

Read more

7/25/2024

Privacy Checklist: Privacy Violation Detection Grounding on Contextual Integrity Theory
Total Score

0

Privacy Checklist: Privacy Violation Detection Grounding on Contextual Integrity Theory

Haoran Li, Wei Fan, Yulin Chen, Jiayang Cheng, Tianshu Chu, Xuebing Zhou, Peizhao Hu, Yangqiu Song

Privacy research has attracted wide attention as individuals worry that their private data can be easily leaked during interactions with smart devices, social platforms, and AI applications. Computer science researchers, on the other hand, commonly study privacy issues through privacy attacks and defenses on segmented fields. Privacy research is conducted on various sub-fields, including Computer Vision (CV), Natural Language Processing (NLP), and Computer Networks. Within each field, privacy has its own formulation. Though pioneering works on attacks and defenses reveal sensitive privacy issues, they are narrowly trapped and cannot fully cover people's actual privacy concerns. Consequently, the research on general and human-centric privacy research remains rather unexplored. In this paper, we formulate the privacy issue as a reasoning problem rather than simple pattern matching. We ground on the Contextual Integrity (CI) theory which posits that people's perceptions of privacy are highly correlated with the corresponding social context. Based on such an assumption, we develop the first comprehensive checklist that covers social identities, private attributes, and existing privacy regulations. Unlike prior works on CI that either cover limited expert annotated norms or model incomplete social context, our proposed privacy checklist uses the whole Health Insurance Portability and Accountability Act of 1996 (HIPAA) as an example, to show that we can resort to large language models (LLMs) to completely cover the HIPAA's regulations. Additionally, our checklist also gathers expert annotations across multiple ontologies to determine private information including but not limited to personally identifiable information (PII). We use our preliminary results on the HIPAA to shed light on future context-centric privacy research to cover more privacy regulations, social norms and standards.

Read more

8/20/2024